In this paper we define a property for multi-party protocols called exclusion-freeness. In multi-party protocols respecting the strongest definition of this property, participants are sure that they will not be excluded from aproto col’s execution and, consequently, they do not have to trust each other any more. We study this property on a wellknown multi-party fair exchange protocol with an online trusted third party and we point out two attacks on this protocol breaking the fairness property and implying excluded participants. Finally, we propose a new multi-party fair exchange protocol with an online trusted third party respecting the strong exclusion-freeness property.5th International Conference on Information Security. Springer-Verlag...
The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repud...
The aim of this paper is to give an overview of the most classical definitions of fairness in exchan...
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has s...
Abstract. In this paper we define a property for multi-party protocols called exclusion-freeness. In...
Some electronic commerce transactions are inherently performed between more than two parties. In thi...
Some electronic commerce transactions are inherently performed between more than two parties. In thi...
In 1999, Bao et al. proposed [6] a multi-party fair exchange protocol of electronic items with an of...
The date of receipt and acceptance will be inserted by the editor Abstract In this paper we introduc...
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studie...
Abstract. A multi-party fair exchange protocol is a cryptographic protocol allowing several parties ...
Recent research has shown that the single-user security of optimistic fair exchange cannot guarantee...
Abstract. In this paper we consider the optimistic approach of the non-repudiation protocols. We stu...
Recent research has shown that the single-user security of optimistic fair exchange cannot guarantee...
In this paper, we propose a modular and fully decentralized protocol to orchestrate fair exchanges b...
In this paper, we propose a modular and fully decentralized protocol to orchestrate fair exchanges b...
The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repud...
The aim of this paper is to give an overview of the most classical definitions of fairness in exchan...
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has s...
Abstract. In this paper we define a property for multi-party protocols called exclusion-freeness. In...
Some electronic commerce transactions are inherently performed between more than two parties. In thi...
Some electronic commerce transactions are inherently performed between more than two parties. In thi...
In 1999, Bao et al. proposed [6] a multi-party fair exchange protocol of electronic items with an of...
The date of receipt and acceptance will be inserted by the editor Abstract In this paper we introduc...
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studie...
Abstract. A multi-party fair exchange protocol is a cryptographic protocol allowing several parties ...
Recent research has shown that the single-user security of optimistic fair exchange cannot guarantee...
Abstract. In this paper we consider the optimistic approach of the non-repudiation protocols. We stu...
Recent research has shown that the single-user security of optimistic fair exchange cannot guarantee...
In this paper, we propose a modular and fully decentralized protocol to orchestrate fair exchanges b...
In this paper, we propose a modular and fully decentralized protocol to orchestrate fair exchanges b...
The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repud...
The aim of this paper is to give an overview of the most classical definitions of fairness in exchan...
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has s...